Beta

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Which Is Better, Adblock Or Adblock Plus?

weilawei Re:None of them. (362 comments)

Betelgeuse! Betelgeuse! Betelgeuse!

2 days ago
top

Gaza's Only Power Plant Knocked Offline

weilawei Re:Radicalization (834 comments)

Flamebait? Talk about poltically motivated shills...

2 days ago
top

Gaza's Only Power Plant Knocked Offline

weilawei Re:Radicalization (834 comments)

You are full of shit. What the fuck has gotten into Slashdot? The numbers show the Israelis to be the aggressors. You'd think that, having lived through a genocide, they wouldn't attempt to do the same to another people.

2008 cease-fire. Look at the number of rocket and mortar *launches*. The cease-fire was honored by the Palestinians. Israel went over the border and killed 6 Hamas members, violating the cease-fire.

On 4 November 2008, the IDF made an incursion at least 250 meters into the Gaza Strip searching for a tunnel, claiming it was intended for the capture of Israeli soldiers and that it intended to continue with the truce, calling the raid a "pinpoint operation".[33] Hamas and, according to an allegation by Dr. Robert Pastor, one IDF source maintained that it was for defensive purposes.[34] As six Hamas fighters were killed,[4][35] Hamas stated that the attack was a "massive breach of the truce".[36]

This year, the Israeli president announces that they can never relinquish control of the West Bank. Meaning they will not accept a sovereign Palestinian state.

"I think the Israeli people understand now what I always say: that there cannot be a situation, under any agreement, in which we relinquish security control of the territory west of the River Jordan."

Just a week ago, the UN called out Israel for using Palestinian children as a human shield, torturing them, putting them in solitary confinement, and threatening sexual abuse. Their foreign minister said, "Israel must go all the way."

What the fuck are you people smoking? This is a genocide in motion. The US government wholeheartedly, 100%, with NO dissent supports it, when only 87% of the Israelis themselves support it. The House of Reps even called the attacks "unprovoked". I mean, seriously, WHAT THE FUCK?

For the record, I don't support either side shooting at each other, but it's not hard to see that this is some seriously fucked up shit on Israel's part. No person or group should engage in genocide and war crimes. Right now, Israel is doing 99% of the committing war crimes. That may have been different in the past, and it may change in the future, but it is NO EXCUSE.

2 days ago
top

Internet Census 2012 Data Examined: Authentic, But Chaotic and Unethical

weilawei Re:I wonder (32 comments)

When you use a machine, it ceases to become idle. It incurs bandwidth and power costs. That's (one of) the unethical bits.

3 days ago
top

Experiment Shows People Exposed To East German Socialism Cheat More

weilawei Re:let me correct that for you. (616 comments)

That requires more than one step of logical thought. Typical reaction when attempting to apply logic to any discourse: "I don't care" (because it's too damn complicated, so who would want to tax their brain?)

about a week ago
top

Experiment Shows People Exposed To East German Socialism Cheat More

weilawei Re:let me correct that for you. (616 comments)

You there! With the logic! Stop doing that!

about a week ago
top

The Last Three Months Were the Hottest Quarter On Record

weilawei Re:Check those numbers, submitter (552 comments)

e^(i*(1/2)*2*piiiii)+(0.19915)=-0.80085

Whoops, I switched a sign there.

about two weeks ago
top

The Last Three Months Were the Hottest Quarter On Record

weilawei Re:Check those numbers, submitter (552 comments)

And e^(i*(1/2)*2*piiiii)-(0.19915)=0.80085. See what I did there?

about two weeks ago
top

CDC Closes Anthrax, Flu Labs After Potentially Deadly Mix-Ups Come to Light

weilawei Re:Employees supposed to have been killed (89 comments)

It is perhaps a somewhat awkwardly written sentence, but it is not grammatically incorrect or ambiguous as far as I can tell.

Just run it by a constitutional scholar. I'm sure they'll provide you with many more interpretations.

about three weeks ago
top

Ask Slashdot: Best Dedicated Low Power Embedded Dev System Choice?

weilawei Best <insert-x-here> (183 comments)

Emacs! Oh wait, wrong flame war..

about three weeks ago
top

Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On

weilawei No Warrant? (223 comments)

Under the heading “Nationality,” the list designates 202 email addresses as belonging to “U.S. persons,” 1,782 as belonging to “non-U.S. persons,” and 5,501 as “unknown” or simply blank. The Intercept identified the five Americans placed under surveillance from their email addresses.

It is unclear whether the government obtained any legal permission to monitor the Americans on the list. The FBI and the Justice Department declined to comment for this story. During the course of multiple conversations with The Intercept, the NSA and the Office of the Director of National Intelligence urged against publication of any surveillance targets. “Except in exceptional circumstances,” they argued, surveillance directly targeting Americans is conducted only with court-approved warrants. Last week, anonymous officials told another news outlet that the government did not have a FISA warrant against at least one of the individuals named here during the timeframe covered by the spreadsheet.

So, for all the idiots arguing that we have FISA to make sure mass surveillance isn't abused: it looks like they've decided to skip that step entirely.

about three weeks ago
top

When Beliefs and Facts Collide

weilawei Re: It's Okay (725 comments)

emacs or via

Well, I do believe that Emacs has C-x M-c M-fixcat, but if you're looking for veterinary software specifically, instead of a PUSS (Primordial Universal Sapience Simulator), VIA appears to come highly recommended--at least by their marketing materials.

Change, no matter what it is, can be difficult. Contributing to the level of difficulty, Dr. Eigner was traveling almost two weeks per month. But to stay on top of things she was able to use remote access capabilities to log on to VIA from wherever in the world she was. Nevertheless, Dr. Eigner decided to go paperless using VIA’s SOAP note generator over the course of a weekend.

On the other hand, you might want to drop the SOAP.

It's late. I should probably sleep.

about three weeks ago
top

When Beliefs and Facts Collide

weilawei Re:Not surprising. (725 comments)

Hats off to you! Holy shit, you managed to do the impossible. Folks, get out your checkbooks! I won't get into the middle of the AGW debate itself, but rather your huge gaping logical error:

The truth is, this effect is almost surely completely unpredictable, and quite likely insignificant.

First, you state that the effects are "almost surely completely unpredictable". Then you make a prediction, drawing the conclusion that the effects are "quite likely insignificant". For fucks sake, if you don't have a model with good predictive power, you certainly can't draw any "quite likely" conclusions. Your proper response should have been that "the effects are unknown" if no model exists with good predictive power.

about three weeks ago
top

New Snowden Leak: of 160000 Intercepted Messages, Only 10% From Official Targets

weilawei Re:What haven't they lied about? (201 comments)

All of these words need entries:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

You're not under arrest. You're being detained. Russia or the US?

Target. (You're not being targeted, you're just being incidentally collected.)

War. (When did Congress declare the last one?)

about three weeks ago
top

New Snowden Leak: of 160000 Intercepted Messages, Only 10% From Official Targets

weilawei Re:hmm.... (201 comments)

I managed to miss that in the news, but it's absolutely a load of bullshit and it needs to go. Just in case anyone else missed it like I did:

From NDR:

The monitoring of connections to an MIT graduate’s server on the university campus is part of the intelligence services’ attempt to particularly focus on users of privacy software on the internet. The computer server is owned by US citizen Roger Dingledine, the creator of the Tor anonymity software. The IP address of the server operated by Dingledine is clearly defined in the source code as targeted object.

From NDR:

The former NSA director General Keith Alexander stated that all those communicating with encryption will be regarded as terror suspects and will be monitored and stored as a method of prevention, as quoted by the Frankfurter Allgemeine Zeitung in August last year. The top secret source code published here indicates that the NSA is making a concerted effort to combat any and all anonymous spaces that remain on the internet. Merely visiting privacy-related websites is enough for a user's IP address to be logged into an NSA database.

Oh, and a sample of the rules. Do you read Linux Journal?

// START_DEFINITION /*
These variables define terms and websites relating to the TAILs (The Amnesic
Incognito Live System) software program, a comsec mechanism advocated by
extremists on extremist forums.
*/

$TAILS_terms=word('tails' or 'Amnesiac Incognito Live System') and word('linux'
or ' USB ' or ' CD ' or 'secure desktop' or ' IRC ' or 'truecrypt' or ' tor ');
$TAILS_websites=('tails.boum.org/') or ('linuxjournal.com/content/linux*'); // END_DEFINITION // START_DEFINITION /*
This fingerprint identifies users searching for the TAILs (The Amnesic
Incognito Live System) software program, viewing documents relating to TAILs,
or viewing websites that detail TAILs.
*/
fingerprint('ct_mo/TAILS')=
fingerprint('documents/comsec/tails_doc') or web_search($TAILS_terms) or
url($TAILS_websites) or html_title($TAILS_websites); // END_DEFINITION

about three weeks ago
top

New Snowden Leak: of 160000 Intercepted Messages, Only 10% From Official Targets

weilawei Re:The Spin (201 comments)

I'm not entirely sure what you're suggesting about the Post, Bezos, the CIA, and the NSA ("CARRIER LOST..." Now that that's out of our system, let's continue.) in relation to each other and over what turf, but they're saying "not nice" things about the NSA in 24kt gold words.

At one level, the NSA shows scrupulous care in protecting the privacy of U.S. nationals and, by policy, those of its four closest intelligence allies — Britain, Australia, Canada and New Zealand.

With their track record? Care? Scrupulous care? Insert incredulity here.

about three weeks ago
top

New Snowden Leak: of 160000 Intercepted Messages, Only 10% From Official Targets

weilawei Re:The Spin (201 comments)

For bonus points, try searching that page for the word 'illegal' or 'unlawful'. You will not find it. Words containing 'legal' appear only twice. The use of 'lawful' occurs once, in 'lawfully', where they claim:

Most of the people caught up in those programs are not the targets and would not lawfully qualify as such.

So, they don't lawfully qualify as being targeted. So it's not actually targeting is what they're arguing. (Also, a load of BS.)

about three weeks ago

Submissions

top

Basecamp Stores Your Passwords in Plaintext

weilawei weilawei writes  |  about 5 years ago

weilawei (897823) writes "Basecamp stores your password in plaintext. To see this, click on "My info" and then remove "edit" from the URL.

This opens up huge opportunities for exploits when people are away from their desk or when your password is emailed (instead of reset, as is appropriate). Not everyone uses a different password for every wesbsite."
top

Secure Tunneling in OS X

weilawei weilawei writes  |  more than 5 years ago

weilawei (897823) writes "I spend a lot of time on public wifi but I don't want people sniffing my traffic. How would I tunnel all my traffic, including DNS, to a remote server (using OpenSSH) under OS X? Specific browsers (e.g., Firefox) can be forced to defer DNS resolution to the remote host, but this isn't a viable option for every application. The proxy options in System Preferences appear to leak DNS requests, so the built-in client isn't an option either."

Journals

weilawei has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?
or Connect with...

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>